Skip to main content

Security Issues in mGovernment

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 12))

Abstract

E-government is one of the most rapidly evolving service domains in the contemporary information society. Many governments have already developed and provided e-government services to businesses and citizens. Nowadays actors in the government domain attempt to take the next step and exploit the latest wireless technologies in order to provide ubiquitous services for mobile users. However, this approach involves some hidden risks mainly due to the inherent insecurity of the air medium and the vulnerabilities of the wireless systems. Thus, in this paper we investigate the security gaps and considerations which should be taken into account for an m-government system. Finally, we provide a list of security guidelines and policies, which the users of the system should be aware of and follow in order to avoid security attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barkan, E., Biham, E., Keller, N.: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. Technical Report CS-2003-05, Technion - Israel Institute of Technology (2003)

    Google Scholar 

  2. Bassara, A., Wiśniewski, M., Żebrowski, P.: USE-ME.GOV - Usability-driven open platform for mobile government. In: Proc. of Business Information Systems (BIS) 2005, Poznań, Poland, pp. 193–202 (2005a)

    Google Scholar 

  3. Bassara, A., Wiśniewski, M., Żebrowski, P.: USE-ME.GOV – A Requirements-driven Approach for M-Gov Services Provisioning. In: Proc. of Business Information Systems (BIS) 2005, Poznań, Poland, pp. 203–214 (2005b)

    Google Scholar 

  4. Beynon-Davies, P.: Constructing electronic government: the case of the UK inland revenue. International Journal of Information Management 25, 3–20 (2005)

    Google Scholar 

  5. Biham, E., Dunkelman, O.: Cryptanalysis of the A5/1 GSM Stream Cipher. In: Proc. of the First International Conference on Progress in Cryptology, pp. 43–51 (2000)

    Google Scholar 

  6. Borisov, N., Goldberg, I., Wagner, D.: Intercepting mobile communications: The insecurity of 802.11. In: Proc. of the 7th annual International Conference on Mobile computing and networking, Rome, Italy, pp. 180–189 (2001)

    Google Scholar 

  7. Hamzeh, K., Pall, G., Verthein, W., Taarud, J., Little, W., Zorn, G.: Point-to-Point Tunneling Protocol (PPTP), RFC 2637 (1999)

    Google Scholar 

  8. Jakobsson, M., Wetzel, S.: Security weaknesses in Bluetooth. In: Proc. of RSA Security Conference- Cryptographer’s Track. LNCS. Springer, Heidelberg (2002)

    Google Scholar 

  9. Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol, RFC 2401 (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kumar, M., Hanumanthappa, M., Reddy, B.L. (2008). Security Issues in mGovernment. In: Jahankhani, H., Revett, K., Palmer-Brown, D. (eds) Global E-Security. ICGeS 2008. Communications in Computer and Information Science, vol 12. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69403-8_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69403-8_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69402-1

  • Online ISBN: 978-3-540-69403-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics